Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
The state-of-the-art Cloud Computing (CC) has been commercially popular for shared resources of third party applications. A cloud platform enables to share resources among mutually distrusting CC clients and offers cost-effective, on-demand scaling. With the exponential growth of CC environment, vul...
| Main Authors: | Shahid, Anwar, Mohamad Fadli, Zolkipli, Zakira, Inayat, Jasni, Mohamad Zain, Abdullah, Gani, Nor Badrul, Anuar, Khan, Muhammad Khurram, Chang, Victor |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Elsevier Ltd
2017
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/18325/ http://umpir.ump.edu.my/id/eprint/18325/1/Cross-VM%20cache-based%20side%20channel%20attacks%20and%20proposed%20prevention%20mechanisms-%20A%20survey.pdf http://umpir.ump.edu.my/id/eprint/18325/2/Cross-VM%20cache-based%20side%20channel%20attacks%20and%20proposed%20prevention%20mechanisms-%20A%20survey%201.pdf |
Similar Items
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
by: Zakira, Inayat
Published: (2017)
by: Zakira, Inayat
Published: (2017)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010)
by: Abdul-Latip, S. F., et al.
Published: (2010)
A secure cryptographic algorithm against side channel attacks
by: Abu, Nur Azman, et al.
Published: (2015)
by: Abu, Nur Azman, et al.
Published: (2015)
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
by: Zakira, Inayat, et al.
Published: (2017)
by: Zakira, Inayat, et al.
Published: (2017)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
A balanced secure cryptographic algorithm against timing and side channel attacks
by: Abu, Nur Azman, et al.
Published: (2014)
by: Abu, Nur Azman, et al.
Published: (2014)
Klasifikasi varian Miriek (VM): bukti integrasi linguistik
by: Siti Hajar Mohammed,, et al.
Published: (2020)
by: Siti Hajar Mohammed,, et al.
Published: (2020)
Network performance testing on VM based autonomous web server
by: Mas'ud, M. Zaki, et al.
Published: (2006)
by: Mas'ud, M. Zaki, et al.
Published: (2006)
An efficient VM scheduling algorithm to minimize the makespan and maximize the profit
by: Ibrahim, Aws Fadhil
Published: (2019)
by: Ibrahim, Aws Fadhil
Published: (2019)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Intrusion Response Systems: Foundations, Design, and Challenges
by: Zakira, Inayat, et al.
Published: (2016)
by: Zakira, Inayat, et al.
Published: (2016)
Eavesdropping attacks on QKD channels
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
Adaptive chosen all inputs model for analyzing key derivation functions against bit-flip and timing side-channel attacks
by: Koh, Wen Wen
Published: (2019)
by: Koh, Wen Wen
Published: (2019)
Project management in the Malaysian construction industry / T. Suresh a/l V.M. Thambyiah
by: V. M. Thambyiah, T. Suresh
Published: (1998)
by: V. M. Thambyiah, T. Suresh
Published: (1998)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
A Survey on Balancing Data Loss Prevention (DLP) with User Privacy in a
Data-Driven World
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Rough web caching
by: Sulaiman, Sarina, et al.
Published: (2009)
by: Sulaiman, Sarina, et al.
Published: (2009)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Biovanillin: production concepts and prevention of side product
formation
by: Galadima, Ahmed Ibrahim, et al.
Published: (2020)
by: Galadima, Ahmed Ibrahim, et al.
Published: (2020)
Mobile Cloud Computing with SOAP and REST Web Services
by: Ali, Mushtaq, et al.
Published: (2018)
by: Ali, Mushtaq, et al.
Published: (2018)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Implications of caching for JXTA peers
by: Rozlina, Mohamed
Published: (2014)
by: Rozlina, Mohamed
Published: (2014)
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Influence of different roughness of bed and side walls in an open channel
by: Siti Natasha, Shamshul Bahri
Published: (2014)
by: Siti Natasha, Shamshul Bahri
Published: (2014)
A Static Approach towards Mobile Botnet Detection
by: Shahid, Anwar, et al.
Published: (2016)
by: Shahid, Anwar, et al.
Published: (2016)
Management front end for cache server
by: Chan, Yunn Chyuan
Published: (2010)
by: Chan, Yunn Chyuan
Published: (2010)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
Similar Items
-
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
by: Zakira, Inayat
Published: (2017) -
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014) -
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010)